Static task
static1
Behavioral task
behavioral1
Sample
1599f5888ab36be3a231ef7e30e49f52_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1599f5888ab36be3a231ef7e30e49f52_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1599f5888ab36be3a231ef7e30e49f52_JaffaCakes118
-
Size
110KB
-
MD5
1599f5888ab36be3a231ef7e30e49f52
-
SHA1
832755aa12f274e14ee79f29d1598bc6fb4e3f7a
-
SHA256
e1bf421b873ff5d1cb6a0c5e1ac5f0a1d31c689a96dae09b377d6b62d2c0481d
-
SHA512
8719411b3c095ee0a1defebe64082807a3b8d87178d8ffabd0c6b320c3ec4054fd0f93b5fd77d58c933e4e630387d5a10a613b594b88f159f150de8aea0d20a7
-
SSDEEP
1536:kO+wlkIAjRiamkcchtGcgWiO4BvuwPRo76j5yja3z7UHKArxE:kO+wlktiwcStG3ZLUabDIHKAlE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1599f5888ab36be3a231ef7e30e49f52_JaffaCakes118
Files
-
1599f5888ab36be3a231ef7e30e49f52_JaffaCakes118.exe windows:4 windows x86 arch:x86
6c3f06049581c25bf7f9a8eab514d6ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoUninitialize
kernel32
VirtualAllocEx
ExitThread
GetModuleHandleA
GetFileAttributesA
lstrcmpA
LockResource
GetACP
ExitProcess
GetProcAddress
GetFileSize
LocalAlloc
CreateEventA
ReadFile
LoadLibraryExA
msvcrt
strncmp
log
memmove
user32
GetMenu
GetSysColor
IsChild
SetWindowPos
EnumWindows
GetDesktopWindow
EqualRect
UpdateWindow
EnumChildWindows
MessageBoxA
EndPaint
GetScrollInfo
GetForegroundWindow
IsDialogMessageA
GetClassNameA
SetTimer
PostQuitMessage
InsertMenuItemA
SetWindowLongA
ScrollWindow
DrawTextA
DispatchMessageA
DrawMenuBar
DeleteMenu
GetMenuItemID
AdjustWindowRectEx
CharToOemA
InvalidateRect
GetActiveWindow
GetCapture
DrawAnimatedRects
MsgWaitForMultipleObjects
SetWindowsHookExA
IsZoomed
GetScrollPos
SetScrollInfo
RedrawWindow
ActivateKeyboardLayout
ReleaseDC
TrackPopupMenu
SetParent
CreateMenu
GetDlgItem
IsWindowUnicode
SetScrollRange
ShowWindow
CloseClipboard
ScreenToClient
DefFrameProcA
GetMenuState
CreateIcon
RemoveMenu
LoadKeyboardLayoutA
EnableWindow
GetMenuItemCount
ReleaseCapture
GetWindowPlacement
MapWindowPoints
PtInRect
TranslateMessage
DrawFrameControl
CallWindowProcA
DrawEdge
MapVirtualKeyA
SetMenu
UnregisterClassA
ClientToScreen
GetWindow
GetKeyboardLayoutNameA
LoadBitmapA
GetIconInfo
GetWindowRect
DrawIcon
OpenClipboard
GetKeyboardLayoutList
SetScrollPos
LoadStringA
SetMenuItemInfoA
EnableMenuItem
GetLastActivePopup
RegisterClipboardFormatA
GetSystemMetrics
DestroyMenu
IsIconic
SendMessageA
IsWindowEnabled
SetFocus
GetWindowThreadProcessId
CallNextHookEx
CharUpperBuffA
GetKeyboardLayout
CheckMenuItem
GetParent
UnhookWindowsHookEx
IsWindow
GetTopWindow
CharNextW
GetSysColorBrush
RegisterClassA
OemToCharA
GetFocus
GetCursor
GetSubMenu
GetMessagePos
GetClientRect
GetKeyboardState
GetWindowDC
GetWindowLongW
SetWindowTextA
DestroyCursor
CharNextA
GetClassLongA
MoveWindow
ShowOwnedPopups
IsRectEmpty
CreatePopupMenu
SetCursor
DestroyIcon
IsWindowVisible
oleaut32
SafeArrayPtrOfIndex
SysStringLen
SysFreeString
SysReAllocStringLen
SafeArrayGetUBound
RegisterTypeLib
shlwapi
PathGetCharTypeA
SHEnumValueA
PathIsContentTypeA
SHStrDupA
SHQueryInfoKeyA
SHQueryValueExA
SHDeleteKeyA
SHSetValueA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
comdlg32
GetFileTitleA
shell32
Shell_NotifyIconA
SHGetDesktopFolder
SHGetDiskFreeSpaceA
gdi32
CreateBrushIndirect
SetPixel
SelectObject
GetClipBox
CreateBitmap
GetRgnBox
CopyEnhMetaFileA
advapi32
GetUserNameA
GetLengthSid
comctl32
ImageList_Read
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 489B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ